Skip to main content
Top
Published in: Microsystem Technologies 9/2017

18-08-2016 | Technical Paper

An image-in-image communication scheme using secret sharing and M-ary spread spectrum watermarking

Authors: Tapasi Bhattacharjee, Santi P. Maity

Published in: Microsystem Technologies | Issue 9/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Secret image sharing is a means of secure transmission of images on an open network through meaningful share generation that reduces suspiciousness of conventional image encryption. This paper proposes, an image-in-image communication scheme as SIS for progressive quality access control coupled with data hiding. The secret image is partitioned into few noise-like shadows of reduced size. These are then embedded into a group of host images to generate stego images. Since spread spectrum watermarking meets data imperceptibility and retain hidden data even after different deliberate attacks and unintentional operations, an M-ary SS modulation based watermarking scheme is performed to embed the shadows into the respective set of cover images. Progressive quality access for the secret image depends on the number of the authenticated users participated in the decoding process. Extensive simulation results are reported to highlight the performance of the proposed scheme.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Bhattacharjee T, Maity SP (2015) An integrated progressive secret sharing and data hiding schemes. In: Proceedings of the international conference on microelectronics, circuits and systems Bhattacharjee T, Maity SP (2015) An integrated progressive secret sharing and data hiding schemes. In: Proceedings of the international conference on microelectronics, circuits and systems
go back to reference Blakley G (1979) Safeguarding cryptographic keys. In: Proceedings of the 1979 AFIPS national computer conference Blakley G (1979) Safeguarding cryptographic keys. In: Proceedings of the 1979 AFIPS national computer conference
go back to reference Cheddad A, Condell J, Curran K, McKevitt P (2010) Digital image steganography: survey and analysis of current methods. Sig Process 90(3):727–752CrossRefMATH Cheddad A, Condell J, Curran K, McKevitt P (2010) Digital image steganography: survey and analysis of current methods. Sig Process 90(3):727–752CrossRefMATH
go back to reference Chen YH, Huang HC, Lin CC (2015) Block-based reversible data hiding with multi-round estimation and difference alteration. Multimed Tools Appl 1–26 Chen YH, Huang HC, Lin CC (2015) Block-based reversible data hiding with multi-round estimation and difference alteration. Multimed Tools Appl 1–26
go back to reference Guo J, Zheng P, Huang J (2015) Secure watermarking scheme against watermark attacks in the encrypted domain. J Vis Commun Image Represent 30:125–135CrossRef Guo J, Zheng P, Huang J (2015) Secure watermarking scheme against watermark attacks in the encrypted domain. J Vis Commun Image Represent 30:125–135CrossRef
go back to reference Guo L, Ni J, Su W, Tang C, Shi YQ (2015) Using statistical image model for jpeg steganography: uniform embedding revisited. IEEE Trans Inf Forensics Secur 10(12):2669–2680CrossRef Guo L, Ni J, Su W, Tang C, Shi YQ (2015) Using statistical image model for jpeg steganography: uniform embedding revisited. IEEE Trans Inf Forensics Secur 10(12):2669–2680CrossRef
go back to reference Hong W (2013) Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique. Inf Sci 221:473–489CrossRef Hong W (2013) Adaptive image data hiding in edges using patched reference table and pair-wise embedding technique. Inf Sci 221:473–489CrossRef
go back to reference Hou YC, Quan ZY, Tsai CF (2015) A privilege-based visual secret sharing model. J Vis Commun Image Represent 33:358–367CrossRef Hou YC, Quan ZY, Tsai CF (2015) A privilege-based visual secret sharing model. J Vis Commun Image Represent 33:358–367CrossRef
go back to reference Huang HC, Lu YY, Lin J (2016) Ownership protection for progressive image transmission with reversible data hiding and visual secret sharing. Optik Int J Light Electron Opt 127(15):5950–5960CrossRef Huang HC, Lu YY, Lin J (2016) Ownership protection for progressive image transmission with reversible data hiding and visual secret sharing. Optik Int J Light Electron Opt 127(15):5950–5960CrossRef
go back to reference Huynh NT, Bharanitharan K, Chang CC (2015) Quadri-directional searching algorithm for secret image sharing using meaningful shadows. J Vis Commun Image Represent 28:105–112CrossRef Huynh NT, Bharanitharan K, Chang CC (2015) Quadri-directional searching algorithm for secret image sharing using meaningful shadows. J Vis Commun Image Represent 28:105–112CrossRef
go back to reference Lee CF, Huang YL (2013) Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun Syst 52(4):2237–2247CrossRef Lee CF, Huang YL (2013) Reversible data hiding scheme based on dual stegano-images using orientation combinations. Telecommun Syst 52(4):2237–2247CrossRef
go back to reference Lee CW, Tsai WH (2013) A data hiding method based on information sharing via png images for applications of color image authentication and metadata embedding. Sig Process 93(7):2010–2025CrossRef Lee CW, Tsai WH (2013) A data hiding method based on information sharing via png images for applications of color image authentication and metadata embedding. Sig Process 93(7):2010–2025CrossRef
go back to reference Li P, Yang CN, Zhou Z (2016) Essential secret image sharing scheme with the same size of shadows. Digit Sig Process 50:51–60CrossRef Li P, Yang CN, Zhou Z (2016) Essential secret image sharing scheme with the same size of shadows. Digit Sig Process 50:51–60CrossRef
go back to reference Lin YY, Wang RZ (2010) Scalable secret image sharing with smaller shadow images. IEEE Sig Process Lett 17(3):316–319MathSciNetCrossRef Lin YY, Wang RZ (2010) Scalable secret image sharing with smaller shadow images. IEEE Sig Process Lett 17(3):316–319MathSciNetCrossRef
go back to reference Lu TC, Wu JH, Huang CC (2015) Dual-image-based reversible data hiding method using center folding strategy. Sig Process 115:195–213CrossRef Lu TC, Wu JH, Huang CC (2015) Dual-image-based reversible data hiding method using center folding strategy. Sig Process 115:195–213CrossRef
go back to reference Maity SP, Maity S, Sil J (2012) Multicarrier spread spectrum watermarking for secure error concealment in fading channel. Telecommun Syst 49(2):219–229CrossRef Maity SP, Maity S, Sil J (2012) Multicarrier spread spectrum watermarking for secure error concealment in fading channel. Telecommun Syst 49(2):219–229CrossRef
go back to reference Minamoto T, Ohura R (2014) A blind digital image watermarking method based on the dyadic wavelet transform and interval arithmetic. Appl Math Comput 226:306–319MATH Minamoto T, Ohura R (2014) A blind digital image watermarking method based on the dyadic wavelet transform and interval arithmetic. Appl Math Comput 226:306–319MATH
go back to reference Naor M, Shamir A (1995) Visual cryptography. In: Advances in cryptology, EUROCRYPTO94, vol 950. Springer-Verlag, pp 1–12 Naor M, Shamir A (1995) Visual cryptography. In: Advances in cryptology, EUROCRYPTO94, vol 950. Springer-Verlag, pp 1–12
go back to reference Qin C, Chang CC, Chiu YP (2014) A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans Image Process 23(3):969–978MathSciNetCrossRef Qin C, Chang CC, Chiu YP (2014) A novel joint data-hiding and compression scheme based on SMVQ and image inpainting. IEEE Trans Image Process 23(3):969–978MathSciNetCrossRef
go back to reference Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 1314:95–113CrossRefMATH Subhedar MS, Mankar VH (2014) Current status and key issues in image steganography: a survey. Comput Sci Rev 1314:95–113CrossRefMATH
go back to reference Tuncer T, Avci E (2016) A reversible data hiding algorithm based on probabilistic dna-xor secret sharing scheme for color images. Displays 41:1–8CrossRef Tuncer T, Avci E (2016) A reversible data hiding algorithm based on probabilistic dna-xor secret sharing scheme for color images. Displays 41:1–8CrossRef
go back to reference Valizadeh A, Wang ZJ (2012) An improved multiplicative spread spectrum embedding scheme for data hiding. IEEE Trans Inf Forensics Secur 7(4):1127–1143CrossRef Valizadeh A, Wang ZJ (2012) An improved multiplicative spread spectrum embedding scheme for data hiding. IEEE Trans Inf Forensics Secur 7(4):1127–1143CrossRef
go back to reference Wang Z, Arce GR, Di Crescenzo G (2009) Halftone visual cryptography via error diffusion. Trans Inf Forensics Sec 4(3):383–396CrossRefMATH Wang Z, Arce GR, Di Crescenzo G (2009) Halftone visual cryptography via error diffusion. Trans Inf Forensics Sec 4(3):383–396CrossRefMATH
go back to reference Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. Trans Img Proc. 13(4):600–612CrossRef Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. Trans Img Proc. 13(4):600–612CrossRef
go back to reference Wei SC, Hou YC, Lu YC (2015) A technique for sharing a digital image. Comput Stand Interf 40:53–61CrossRef Wei SC, Hou YC, Lu YC (2015) A technique for sharing a digital image. Comput Stand Interf 40:53–61CrossRef
go back to reference Wu X, Sun W (2012) Random grid-based visual secret sharing for general access structures with cheat-preventing ability. J Syst Softw 85(5):1119–1134CrossRef Wu X, Sun W (2012) Random grid-based visual secret sharing for general access structures with cheat-preventing ability. J Syst Softw 85(5):1119–1134CrossRef
go back to reference Yan X, Wang S, Niu X, Yang C (2015) Generalized random grids-based threshold visual cryptography with meaningful shares. Sig Process 109:317–333CrossRef Yan X, Wang S, Niu X, Yang C (2015) Generalized random grids-based threshold visual cryptography with meaningful shares. Sig Process 109:317–333CrossRef
go back to reference Yang C, Li P, Wu C, Cai S (2015) Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach. Sig Proc Image Commun 31:1–9 Yang C, Li P, Wu C, Cai S (2015) Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach. Sig Proc Image Commun 31:1–9
go back to reference Yang CN, Chu YY (2011) A general (k, n) scalable secret image sharing scheme with the smooth scalability. J Syst Softw 84(10):1726–1733CrossRef Yang CN, Chu YY (2011) A general (k, n) scalable secret image sharing scheme with the smooth scalability. J Syst Softw 84(10):1726–1733CrossRef
Metadata
Title
An image-in-image communication scheme using secret sharing and M-ary spread spectrum watermarking
Authors
Tapasi Bhattacharjee
Santi P. Maity
Publication date
18-08-2016
Publisher
Springer Berlin Heidelberg
Published in
Microsystem Technologies / Issue 9/2017
Print ISSN: 0946-7076
Electronic ISSN: 1432-1858
DOI
https://doi.org/10.1007/s00542-016-3104-z

Other articles of this Issue 9/2017

Microsystem Technologies 9/2017 Go to the issue